professor-messer-sy0-701-comptia-security-plus-course-notes-v106

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 17

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

18 Terms

1

The CIA Triad consists of __________, __________, and __________.

Confidentiality, Integrity, and Availability
New cards
2
Non-repudiation refers to the ability to provide __________ for actions performed.
Proof of integrity and authenticity to ensure a party cannot deny their actions.
New cards
3
The principle of least privilege aims to give users only the access necessary to __________ their job functions.
Perform.
New cards
4
In vulnerability scanning, a __________ scan tests internal and external systems for open ports.
Port.
New cards
5
A Distributed Denial of Service (DDoS) attack aims to make a service unavailable by __________ it with excessive traffic.
Overloading.
New cards
6
The process of ensuring a system operates normally after an incident is called __________.
Recovery.
New cards
7
In risk management, an unacceptable level of risk that must be avoided or mitigated is referred to as __________ risk.
Unacceptable.
New cards
8
A security policy that allows or disallows access based on group membership is known as __________ access control.
Role-based.
New cards
9
The acronym UTM stands for __________.
Unified Threat Management.
New cards
10
A strong password policy often encourages the use of __________, __________, and __________ characters.
Uppercase letters, lowercase letters, and special.
New cards
11
Multi-factor authentication includes something you know, something you have, and something __________.
You are.
New cards
12
Zero trust security requires that ___________ is verified before granting access, no matter where the request originates from.
Everything.
New cards
13
Malware designed to replicate and spread without user intervention is classified as a __________.
Worm.
New cards
14
The process of disguising information to make it difficult to understand is known as __________.
Obfuscation.
New cards
15
The framework used to guide the identification and analysis of security incidents is referred to as __________.
NIST SP800-61.
New cards
16
The confidential email security standard to ensure secure submittal of emails is __________.
DMARC.
New cards
17
When it comes to data retention, organizations often must comply with specific __________ requirements depending on their industry.
Legal.
New cards
18
A Directed attack usually targets a specific __________ or __________ rather than a random group.
Organization; individual.
New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot